Anda di halaman 1dari 5

DAFTAR IS

ABSTRAK................................................................................................................i

ABSTRACT.............................................................................................................ii

KATA PENGANTAR............................................................................................iii

DAFTAR TABEL...................................................................................................ix

DAFTAR GAMBAR...............................................................................................x

BAB I PENDAHULUAN.......................................................................................1

1.1. Latar Belakang..........................................................................................1

1.2. Rumusan Masalah.....................................................................................2

1.3. Tujuan Penelitian.......................................................................................2

1.4. Batasan Masalah........................................................................................2

1.5. Manfaat Penelitian.....................................................................................3

1.6. Metodologi................................................................................................3

BAB II LANDASAN TEORI..................................................................................5

2.1. Sistem........................................................................................................5

2.2. Sistem Akses Kontrol................................................................................5

2.3. Radio Frequency Identification (RFID)....................................................5

2.4. Internet Of Things (IOT)...........................................................................6

2.5. Web Server................................................................................................6

2.6. Database....................................................................................................6

2.7. Tabel..........................................................................................................6

2.8. Rest API (Representational State Transfer)..............................................7

2.9. JSON.........................................................................................................8

i
2.10. Framework Laravel..............................................................................10

2.11. RFID Reader RC522...........................................................................11

2.12. Microcontroller ESP32........................................................................12

2.13. EEPROM.............................................................................................13

2.14. Display LCD TFT 2.4”........................................................................13

2.15. Solenoid Door Lock.............................................................................14

2.16. Mosfet..................................................................................................15

2.17. Buzzer..................................................................................................15

BAB III ANALISIS DAN SISTEM PERANCANGAN......................................16

3.1 Sistem Yang Sudah Dibangun Pada Penelitian Sebelumnya..................16

3.2 Identifikasi Masalah...............................................................................17

3.3 Konsep Sistem Yang Akan Dibangun.....................................................17

3.4 Arsitektur Sistem Yang Akan Dibangun.................................................18

3.5 Alur Kerja Sistem...................................................................................19

3.5.1. Input.................................................................................................20

3.5.2. Proses...............................................................................................20

3.5.3. Output...............................................................................................20

3.6 Analisis Kebutuhan Sistem.....................................................................20

3.7 Kebutuhan Perangkat Lunak Fungsional................................................20

3.8 Analisis Kebutuhan Fungsional...............................................................21

3.9 Analisis Kebutuhan Perangkat Keras Fungsional...................................22

3.10 Analisis Kebutuhan Perangkat Keras Non Fungsional...........................22

3.11 Kebutuhan Sistem....................................................................................22

3.12 Perancagnan Unified Modeling Language (UML)..................................23

3.13 Use Case Diagram...................................................................................23

3.14 Class Diagram.........................................................................................24

ii
3.15 Activity Diagram.....................................................................................25

3.10.1 Activity Diagram Input Data Login.................................................25

3.10.2 Activity Diagram Input Project........................................................25

3.10.3 Activty Diagram Input User.............................................................26

3.10.4 Activity Diagram Input Placement..................................................26

3.10.5 Activity Diagram Input Rule............................................................26

3.10.6 Activity Diagram User Melakukan Tap Kartu RFID.......................27

3.16 Sequence Diagram...................................................................................28

3.17.1 Sequence Diagram Input Data Login...............................................28

3.17.2 Sequence Diagram Input Data Project.............................................28

3.17.3 Sequence Diagram Input Data User.................................................29

3.17.4 Sequence Diagram Input Data Placement........................................29

3.17.5 Sequence Diagram Input Data Rule.................................................30

3.17.6 Sequence Diagram Proses User Melakukan Tap Kartu RFID.........30

3.17 Struktur Tabel Basis Data........................................................................31

3.18 Implementasi Antarmuka........................................................................34

3.17.1 Antarmuka Halaman Login..............................................................34

3.17.2 Antarmukuka Halaman Dashboard..................................................35

3.17.3 Antarmuka Form Pembuatan Projek Baru.......................................35

3.17.4 Antarmuka Dashboard Project.........................................................36

3.17.5 Antar Muka Halaman Daftar User...................................................36

3.17.6 Antarmuka Halaman Detail User.....................................................37

3.17.7 Antarmuka Form Input Password User............................................37

3.17.8 Antarmuka Daftar Hak Akses User................................................38

3.17.9 Antarmuka Log User........................................................................38

3.17.10 Antarmuka Form Input Pembuatan Placement Baru....................38

iii
3.17.11 Antarmuka Halaman List Placement...........................................39

3.17.12 Antarmuka Halaman Detail Placement........................................39

3.17.13 Antarmuka Halaman Log.............................................................40

3.17.14 Antarmuka Halaman Rule Pada Ruangan....................................40

BAB IV IMPLEMENTASI DAN PENGUJIAN...................................................41

4.1. Implementasi...........................................................................................41

4.1.1 Implementasi Perangakat Lunak......................................................41

4.1.2 Implementasi Web Server................................................................41

4.1.3 Implementasi Data Access...............................................................42

4.1.4 Implemenatasi Keamanan Data Access...........................................43

4.1.5 Implementasi Auntetikasi dan Otorisasi..........................................43

4.2. Perancangan Manajemen Perangkat........................................................44

4.3. Implementasi Perangkat Keras................................................................45

4.4. Rangkaian ESP32 dengan LCD TFT......................................................45

4.5. Rangkaian ESP32 dengan Buzzer...........................................................46

4.6. Rangkaian Mosfet dan Solenoid..............................................................46

4.7. Diagram Alir Perangkat RFID Reader....................................................47

4.8. Diagram Alir Perangkat RFID Reader Menyimpan Data Kartu Cadangan
48

4.9. Perancangan Desain Alat.........................................................................49

4.10. Pengujian.............................................................................................50

4.11. Rencana Pengujian...............................................................................50

4.11.1. Pengujian Perangkat Keras...........................................................55

4.11.2. Pengujian Catu Daya....................................................................56

4.11.3. Pengujian Catu Daya Cadangan...................................................57

4.11.4. Pengujian Pembacaan Kartu RFID...............................................59

iv
4.11.5. Pengujian Jika Perangkat RFID Terputus Dari Jaringan Internet 60

4.11.6. Pengujian Validasi Data Kartu RFID...........................................61

4.11.7. Pengujian Kartu Backup...............................................................62

4.11.8. Pengujian Fungsi Kartu Cadangan...............................................63

4.11.9. Pengujian Jika Basic Authentication............................................65

4.12. Hasil Pengujian....................................................................................65

BAB V PENUTUP.................................................................................................66

5.1 Kesimpulan...................................................................................................66

5.2 Saran.............................................................................................................66

DAFTAR PUSTAKA............................................................................................67

LAMPIRAN...........................................................................................................69

Lampiran 1.........................................................................................................69

Lampiran 2.......................................................................................................101

Anda mungkin juga menyukai